Trace and Testing Equivalence on Asynchronous Processes
نویسندگان
چکیده
We study trace and may-testing equivalences in the asynchronous versions of CCS and-calculus. We start from the operational deenition of the may-testing preorder and provide for it nitary and fully abstract trace-based characterizations, along with a complete in-equational proof system. We also touch upon two variants of this theory, by rst considering a more demanding equivalence notion (must-testing) and then a richer version of asynchronous CCS. The results throw light on the diierence between synchronous and asynchronous communication and on the weaker testing power of asynchronous observations. This paper is an extended and revised version of 8] and 9].
منابع مشابه
An Executable Specification of Asynchronous Pi-Calculus Semantics and May Testing in Maude 2.0
We describe an executable specification of the operational semantics of an asynchronous version of the π-calculus in Maude by means of conditional rewrite rules with rewrites in the conditions. We also present an executable specification of the may testing equivalence on non-recursive asynchronous π-calculus processes, using the Maude metalevel. Specifically, we describe our use of the metaSear...
متن کاملA Theory of "May" Testing for Asynchronous Languages
Asynchronous communication mechanisms are usually at the basis of real distributed systems and protocols. For these systems, asynchronous may-based testing seems to be exactly what is needed to capture safety and certain security properties. We study may testing equivalence focusing on the asynchronous versions of CCS and π-calculus. We start from an operational testing preorder and provide fin...
متن کاملA Theory of \ May "
Asynchronous communication mechanisms are usually at the basis of real distributed systems and protocols. For these systems, asynchronous may-based testing seems to be exactly what is needed to capture safety and certain security properties. We study may testing equivalence focusing on the asynchronous versions of CCS and pi-calculus. We start from an operational testing preorder and provide ni...
متن کاملDeciding equivalence-based properties using constraint solving1
Formal methods have proved their usefulness for analyzing the security of protocols. Most existingresults focus on trace properties like secrecy or authentication. There are however several securityproperties, which cannot be de ned (or cannot be naturally de ned) as trace properties and requirea notion of behavioural equivalence. Typical examples are anonymity, privacy related prop...
متن کاملDeciding equivalence-based properties using constraint solving
Formal methods have proved their usefulness for analyzing the security of protocols. Most existingresults focus on trace properties like secrecy or authentication. There are however several securityproperties, which cannot be defined (or cannot be naturally defined) as trace properties and requirea notion of behavioural equivalence. Typical examples are anonymity, privacy related pr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Comput.
دوره 172 شماره
صفحات -
تاریخ انتشار 2002